Short for Browser Exploit Against SSL/TLS, SSL Beast is an exploit first, revealed in late September 2011, that leverages weaknesses in cipher block chaining (CBC) to exploit the Secure Sockets Layer (SSL) protocol. The CBC vulnerability can enable man-in-the-middle (MITM) attacks against SSL in order to silently decrypt and obtain authentication tokens, providing hackers with access to the data passed between a Web server and the Web browser accessing the server.
- Extended Validation SSL (EV SSL)
Extended Validation SSL (EV SSL or EVSSL) certificates are widely considered to be the most trusted option currently available for Secure Sockets Layer (SSL) certificates. While EV SSL certificates utilize the same levels of security as conventional SSL certificates, they do require more extensive verification of the certificate requestor by the certificate authority (CA) issuing […]
- IBM CloudBurst
CloudBurst is a “ready-to-go” solution from IBM that’s designed to provide resource monitoring, cost management and services availability in a cloud. IBM CloudBurst is a key component in the company’s lineup of cloud computing solutions, which also includes IBM Smart Business Storage Cloud, IBM Smart Desktop Cloud and IBMSmartCloud Enterprise. CloudBurst can also refer to […]
Originally a Canadian-based business intelligence and performance management software solutions provider, Cognos was acquired by IBM in 2007 and has since had its software renamed as Cognos Business Intelligence and Financial Performance Management, or Cognos BI and FPM for short. Cognos software is currently used to help businesses gain a better understanding of their financial […]
- licensing technology
Software licensing technology enables software developers to protect their intellectual property by facilitating the process of creating, issuing and managing software licenses. Licensing technology typically includes license key generation, license registration and license management tools to prevent the developer’s software from being copied, shared or otherwise illegally used (aka pirated) by non-licensed users.
- licensing strategy
Software licensing strategy involves the decision-making process and implementation of rules or policies for protecting the intellectual property of a software developer. A wide variety of software licensing strategies exist to meet the needs of the software developer as well as the end user or enterprise that will be utilizing the software. Common licensing strategies […]